HP 5500 Ei 5500 Si Switch Series Configuration Guide
Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
366 # Enable the checking of the MAC addresses and IP addresses of ARP packets. [SwitchB] arp detection validate dst-mac ip src-mac # Configure port isolation. [SwitchB] interface gigabitethernet 1/0/1 [SwitchB-GigabitEthernet1/0/1] port-isolate enable [SwitchB-GigabitEthernet1/0/1] quit [SwitchB] interface gigabitethernet 1/0/2 [SwitchB-GigabitEthernet1/0/2] port-isolate enable [SwitchB-GigabitEthernet1/0/2] quit After the preceding configurations are comp lete, ARP packets received on interfaces GigabitEthernet 1/0/1 and GigabitEthernet 1/ 0/2 have their MAC and IP addresses checked first, and then are checked against the static IP source guard binding entries and finally DHCP snooping entries. However, ARP broadcast requests sent from Host A can pass the check on Switch B and reach Host B. Port isolation fails. # Configure ARP restricted forwarding. [SwitchB] vlan 10 [SwitchB-vlan10] arp restricted-forwarding enable [SwitchB-vlan10] quit After the configuration, Switch B forwards ARP broadcast requests from Host A to Switch A through the trusted port GigabitEthernet 1/0/3, an d thus Host B cannot receive such packets. Port isolation works normally. Configuring ARP automatic scanning and fixed ARP ARP automatic scanning is usually used together with the fixed ARP feature. With ARP automatic scanning enabled on an interface, the device automatically scans neighbors on the interface, sends ARP requests to the neighbors, obtains their MAC addresses, and creates dynamic ARP entries. Fixed ARP allows the device to change the existi ng dynamic ARP entries (including those generated through ARP automatic scanning) into static ARP entr ies. The fixed ARP feature effectively prevents ARP entries from being modified by attackers. HP recommends that you use ARP automatic scanning and fixed ARP in a small-scale network such as a cybercafe. Configuration guidelines Follow these guidelines when you configure ARP automatic scanning and fixed ARP: • IP addresses existing in ARP entries are not scanned. • ARP automatic scanning may take some time. To stop an ongoing scan, press Ctrl + C . Dynamic ARP entries are created based on ARP replies received before the scan is terminated. • The static ARP entries changed from dynamic ARP en tries have the same attributes as the manually configured static ARP entries. • Use the arp fixup c o m m a n d to ch a n g e t h e exi s t i n g dyn a m ic A R P e ntries i nto s ta t ic A R P e nt ries. You can use this command again to change the dyna mic ARP entries learned later into static ARP entries.
367 • The number of static ARP entries changed from dynamic ARP entries is restricted by the number of static ARP entries that the device supports. As a result, the device may fail to change all dynamic ARP entries into static ARP entries. • To delete a specific static ARP entry changed from a dynamic one, use the undo arp ip-address [ vpn-instance-name ] command (The HP 5500 SI switch series does not support the vpn-instance-name argument in the command). To delete all such static ARP entries, use the reset arp all or reset arp static command. Configuration procedure To configure ARP automatic scanning and fixed ARP: Step Command 1. Enter system view. system-view 2. Enter interface view. interface interface-type interface-number 3. Enable ARP automatic scanning. arp scan [ start-ip-address to end-ip-address ] 4. Return to system view. quit 5. Enable fixed ARP. arp fixup Configuring ARP gateway protection The ARP gateway protection feature, if configured on ports not connected with the gateway, can block gateway spoofing attacks. When such a port receives an ARP packet, it checks whether the sender IP address in the packet is consistent with that of any protected gateway. If yes, it discards the packet. If not, it handles the packet normally. Configuration guidelines Follow these guidelines when you configure ARP gateway protection: • You can enable ARP gateway protection for up to eight gateways on a port. • Commands arp filter source and arp filter binding cannot be both configured on a port. • If ARP gateway protection works with ARP dete ction and ARP snooping, ARP gateway protection applies first. Configuration procedure To configure ARP gateway protection: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter Layer 2 Ethernet interface view/Layer 2 aggregate interface view. interface interface-type interface-number N/A
368 Step Command Remarks 3. Enable ARP gateway protection for a specified gateway. arp filter source ip-address Disabled by default Configuration example Network requirements As shown in Figure 132, H ost B launches gateway spoofing attacks to Switch B. As a result, traffic that Switch B intends to send to Switch A is sent to Host B. Configure Switch B to block such attacks. Figure 132 Network diagram Configuration procedure # Configure ARP gateway protection on Switch B. system-view [SwitchB] interface gigabitethernet 1/0/1 [SwitchB-GigabitEthernet1/0/1] arp filter source 10.1.1.1 [SwitchB-GigabitEthernet1/0/1] quit [SwitchB] interface gigabitethernet 1/0/2 [SwitchB-GigabitEthernet1/0/2] arp filter source 10.1.1.1 After the configuration is complete, Switch B will discard the ARP packets whose source IP address is that of the gateway. Configuring ARP filtering To prevent gateway spoofing and user spoofing, the AR P filtering feature controls the forwarding of ARP packets on a port. The port checks the sender IP and MAC addresses in a received ARP packet against configured ARP filtering entries. If a match is found, the packet is handled normally. If not, the packet is discarded.
369 Configuration guidelines Follow these guidelines when you configure ARP filtering: • You can configure up to eight ARP filtering entries on a port. • Commands arp filter source and arp filter binding cannot be both configured on a port. • If ARP filtering works with ARP detection an d ARP snooping, ARP filtering applies first. Configuration procedure To c o n fig u re A R P fi l te ri ng : Step Command Remarks 1. Enter system view. system-view N/A 2. Enter Layer 2 Ethernet interface view/Layer 2 aggregate interface view. interface interface-type interface-number N/A 3. Configure an ARP filtering entry. arp filter binding ip-address mac-address Not configured by default Configuration example Network requirements As shown in Figure 133, the I P and MAC addresses of Host A are 10.1.1.2 and 000f-e349-1233. The IP and MAC addresses of Host B are 10.1.1.3 and 000f-e349-1234. Configure ARP filtering on GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 of Switch B to permit specific ARP packets only. Figure 133 Network diagram Configuration procedure # Configure ARP filtering on Switch B. system-view
370 [SwitchB] interface gigabitethernet 1/0/1 [SwitchB-GigabitEthernet1/0/1] arp filter binding 10.1.1.2 000f-e349-123\ 3 [SwitchB-GigabitEthernet1/0/1] quit [SwitchB] interface gigabitethernet 1/0/2 [SwitchB-GigabitEthernet1/0/2] arp filter binding 10.1.1.3 000f-e349-123\ 4 After the configuration is complete, GigabitEther net 1/0/1 will permit incoming ARP packets with sender IP and MAC addresses as 10.1.1.2 and 000f-e349-1233, and discard other ARP packets. GigabitEthernet 1/0/2 will permit incoming ARP packets with sender IP and MAC addresses as 10.1.1.9 and 000f-e349-1233 and discard other ARP packets. ARP packets from Host A are permitted, but those from Host B are discarded.
371 Configuring ND attack defense Overview The IPv6 Neighbor Discovery (ND) protocol provides rich functions, such as address resolution, neighbor reachability detection, duplicate address detection, router/prefix discovery and address autoconfiguration, and redirection. However, it does not provide any security mechanisms. Attackers can easily exploit the ND protocol to attack hosts and gateways by sending forged packets. For more information about the five functions of the ND protocol, see Layer 3—IP Services Configuration Guide. The ND protocol implements its function by using five types of ICMPv6 messages: • Neighbor Solicitation (NS) • Neighbor Advertisement (NA) • Router Solicitation (RS) • Router Advertisement (RA) • Redirect (RR) As shown in Figure 134, an at tacker can attack a network by sending forged ICMPv6 messages: • Sends forged NS/NA/RS packets with the IPv6 address of a victim host. The gateway and other hosts update the ND entry for the victim host with incorrect address information. As a result, all packets intended for the victim host are sent to the attacking host rather than the victim host. • Sends forged RA packets with the IPv6 address of a victim gateway. As a result, all hosts attached to the victim gateway maintain incorrect IPv6 configuration parameters and ND entries. Figure 134 ND attack diagram All forged ND packets have two common features: • The Ethernet frame header and the source link layer address option of the ND packet contain different source MAC addresses. Switch Host A Host B IP_ A MAC_ A IP_B MAC_B IP_C MAC_CHost C Forged ND packets Forged ND packets
372 • The mapping between the source IPv6 address and the source MAC address in the Ethernet frame header is invalid. To identify forged ND packets, HP developed the source MAC consistency check and ND detection features. Enabling source MAC consistency check for ND packets Use source MAC consistency check on a gateway to filter out ND packets that carry different source MAC addresses in the Ethernet frame header and the source link layer address option. Follow these guidelines when you enable source MAC consistency check for ND packets: • If VRRP is used, disable source MAC consiste ncy check for ND packets to prevent incorrect dropping of packets. With VRRP, the NA message always conveys a MAC address different from the Source Link-Layer Address option. • Only the HP 5500 EI switches support VRRP. To enable source MAC consistency check for ND packets: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable source MAC consistency check for ND packets. ipv6 nd mac-check enable Disabled by default Configuring the ND detection function Introduction to ND detection Use the ND detection function on access devices to verify the source of ND packets. If an ND packet comes from a spoofing host or gateway, it is discarded. The ND detection function operates on a per VLAN basis. In an ND detection-enabled VLAN, a port is either ND-trusted or ND-untrusted: • An ND-trusted port does not check ND packets for address spoofing. • An ND-untrusted port checks all ND packets but RA and RR messages in the VLAN for source spoofing. RA and RR messages are consider ed illegal and are discarded directly. The ND detection function checks an ND packet by looking up the IPv6 static bindings table of the IP source guard function, ND snooping table, and DHCPv6 snooping table in the following steps: 1. Looks up the IPv6 static binding table of IP source guard, based on the source IPv6 address and the source MAC address in the Ethernet frame header of the ND packet. If an exact match is found, the ND packet is forwarded. If an entry matches th e source IPv6 address but not the source MAC address, the ND packet is discarded. If no en try matches the source IPv6 address, the ND detection function continues to look up the DH CPv6 snooping table and the ND snooping table. 2. If an exact match is found in either the DHCPv6 snooping or ND snooping table, the ND packet is forwarded. If no match is found in either table, the packet is discarded. If neither the DHCPv6 snooping table nor the ND snooping table is available, the ND packet is discarded.
373 Configuration guidelines Follow these guidelines when you configure ND detection: • To create IPv6 static bindings with IP source guard, use the ipv6 source binding command. For more information, see Configuring IP source guard . • T he DHCPv6 snooping table is created automatically by the DHCPv6 snooping module. For more information, see Layer 3—IP Services Configuration Guide . • The ND snooping table is created automatically by the ND snooping module. For more information, see Layer 3—IP Services Configuration Guide . • ND detection performs source check by using the binding tables of IP source guard, DHCPv6 snooping, and ND snooping. To pr event an ND-untrusted port from discarding legal ND packets in an ND detection-enabled VLAN, make sure that at least one of the three functions is available. • When creating an IPv6 static binding with IP source guard for ND detection in a VLAN, specify the VLAN ID for the binding. If not, no ND packets in the VLAN can match the binding. Configuration procedure To configure ND detection: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter VLAN view. vlan vlan-id N/A 3. Enable ND Detection. ipv6 nd detection enable Disabled by default. 4. Quit system view. quit N/A 5. Enter Layer 2 Ethernet interface view or Layer 2 aggregate interface view. interface interface-type interface-number N/A 6. Configure the port as an ND-trusted port. ipv6 nd detection trust Optional. A port does not trust sources of ND packets by default. Displaying and maintaining ND detection Task Command Remarks Display the ND detection configuration. display ipv6 nd detection [ | { begin | exclude | include } regular-expression ] Available in any view Display the statistics of discarded packets when the ND detection checks the user legality. display ipv6 nd detection statistics [ interface interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] Available in any view Clear the statistics by ND detection. reset ipv6 nd detection statistics [ interface interface-type interface-number ] Available in user view
374 ND detection configuration example Network requirements As shown in Figure 135, Ho st A and Host B connect to Switch A, the gateway, through Switch B. Host A has the IPv6 address 10::5 and MAC address 0001-0203-0405. Host B has the IPv6 address 10::6 and MAC address 0001-0203-0607. Enable ND detection on Switch B to filter out forged ND packets. Figure 135 Network diagram Configuration procedure 1. Configuring Switch A: # Enable IPv6 forwarding. system-view [SwitchA] ipv6 # Create VLAN 10. [SwitchA] vlan 10 [SwitchA-vlan10] quit # Assign port GigabitEthernet 1/0/3 to VLAN 10. [SwitchA] interface gigabitethernet 1/0/3 [SwitchA- GigabitEthernet1/0/3] port link-type trunk [SwitchA- GigabitEthernet1/0/3] port trunk permit vlan 10 [SwitchA- GigabitEthernet1/0/3] quit # Assign an IPv6 address to VLAN-interface 10. [SwitchA] interface vlan-interface 10 10::5 0001-0203-0405 Switch A Switch B Host A Host B GE1/0/3 Vlan-int10 10::1 Gateway GE1/0/1GE1/0/3 GE1/0/2 VLAN 10 ND snooping 10::6 0001-0203-0607 Internet
375 [SwitchA-Vlan-interface10] ipv6 address 10::1/64 [SwitchA-Vlan-interface10] quit 2. Configuring Switch B: # Enable IPv6 forwarding. system-view [SwitchB] ipv6 # Create VLAN 10. [SwitchB] vlan 10 [SwitchB-vlan10] quit # Add ports GigabitEthernet 1/0/1 throug h GigabitEthernet 1/0/3 to VLAN 10. [SwitchB] interface gigabitethernet 1/0/1 [SwitchB-GigabitEthernet1/0/1] port access vlan 10 [SwitchB-GigabitEthernet1/0/1] quit [SwitchB] interface gigabitethernet 1/0/2 [SwitchB-GigabitEthernet1/0/2] port access vlan 10 [SwitchB-GigabitEthernet1/0/2] quit [SwitchB] interface gigabitethernet 1/0/3 [SwitchB-GigabitEthernet1/0/3] port link-type trunk [SwitchB-GigabitEthernet1/0/3] port trunk permit vlan 10 [SwitchB-GigabitEthernet1/0/3] quit # Enable ND snooping for global unicast an d link local addresses in VLAN 10. [SwitchB] ipv6 nd snooping enable link-local [SwitchB] ipv6 nd snooping enable global [SwitchB] vlan 10 [SwitchB-vlan 10] ipv6 nd snooping enable # Enable ND detection in VLAN 10. [SwitchB-vlan 10] ipv6 nd detection enable [SwitchB-vlan 10] quit # Configure the uplink port GigabitEthernet 1/0/3 as an ND-trusted port, and the downlink ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 as ND-untrusted ports (the default). [SwitchB] interface gigabitethernet 1/0/3 [SwitchB-GigabitEthernet1/0/3] ipv6 nd detection trust The configuration enables Switch B to check all incoming ND packets of ports GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 based on the ND snooping table.